1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
8 author = {Bassam Alkindy, Christophe Guyeux, Jean-François Couchot,
9 Michel Salomon, Jacques M Bahi},
10 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
13 booktitle = {The IEEE International Conference on Bioinformatics and Biomedicine (BIBM)},
21 address = {Belfast, UK},
28 @inproceedings{chgw+14:oip,
30 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
32 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
33 title = {Pseudorandom Number Generators with Balanced Gray Codes},
34 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
36 address = {Vienna, Austria},
44 @INPROCEEDINGS{nusmv02,
45 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
46 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
47 Sebastiani and Armando Tacchella},
48 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
52 crossref = {DBLP:conf/cav/2002}
56 author = {Nishanth Chandrasekaran},
57 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
62 Author = "Gastin, P. and Oddoux, D.",
63 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
64 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
65 Publisher = "Springer",
73 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
74 title = {A uniform deductive approach for parameterized protocol safety},
78 bibsource = {DBLP, http://dblp.uni-trier.de},
79 crossref = {DBLP:conf/kbse/2005},
80 ee = {http://doi.acm.org/10.1145/1101908.1101971}
83 @INPROCEEDINGS{abcvs05,
84 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
85 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
87 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
91 address = {Guelph, Canada},
93 note = {ISSN 1492-8760}
97 author = {Bahi, J. M.},
98 title = {Boolean totally asynchronous iterations},
106 author = {Bahi, J. M. and Contassot-Vivier, S.},
107 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
117 author = {Bahi, J. M. and Contassot-Vivier, S.},
118 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
123 pages = {1353--1363},
127 @techreport{BCVC10:ir,
128 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
129 title = {Convergence Results of Combining Synchronism and Asynchronism for
130 Discrete-State Discrete-Time Dynamic Network},
132 institution = {LIFC - Laboratoire d’{I}nformatique de
133 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
134 type = {Research Report},
135 number = {RR2010-02},
136 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
140 @techreport{Cou10:ir,
141 author = {Couchot, J.-F.},
142 title = {Formal {C}onvergence {P}roof for {D}iscrete
143 {D}ynamical {S}ystems},
145 institution = {LIFC - Laboratoire d’{I}nformatique de
146 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
147 type = {Research Report},
148 number = {RR2010-03},
149 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
157 author = {Bahi, J. M. and Michel, C.},
158 title = {Convergence of discrete asynchronous iterations},
159 journal = {International Journal Computer Mathematics},
166 author = {Bahi, J. M. and Michel, C.},
167 title = {Simulations of asynchronous evolution of discrete systems},
168 journal = {Simulation Practice and Theory},
176 author = {G\'{e}rard M. Baudet},
177 title = {Asynchronous Iterative Methods for Multiprocessors},
183 doi = {http://doi.acm.org/10.1145/322063.322067},
189 title = {Parallel and distributed computation: numerical methods},
190 publisher = prenticeHall,
192 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
193 isbn = {0-13-648700-9}
197 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
198 title = {The software model checker Blast},
206 @INPROCEEDINGS{LeCun85,
208 title = {A learning scheme for threshold networks},
209 booktitle = {Cognitiva'95},
212 address = {Paris, France}
216 author = {Jeffrey L. Elman},
217 title = {Finding Structure in Time},
218 journal = {Cognitive Science},
225 author = {Andreas Frommer and Daniel B. Szyld},
226 title = {On asynchronous iterations},
232 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
238 author = {Goles Ch., E. and Salinas,L.},
239 title = {Comparison between parallel and serial dynamics of Boolean networks},
248 title = {The SPIN Model Checker: Primer and Reference Manual},
249 publisher = {Addison-Wesley, Pearson Education},
251 author = {Gerard J. Holzmann}
255 author = {Shih M.-H. and Ho, J.-L.},
256 title = {Solution of the Boolean Markus-Yamabe Problem},
257 journal = advapplMath,
265 author = {Adrien Richard},
266 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
268 journal = advapplMath,
277 author = {Adrien Richard and Jean-Paul Comet},
278 title = {Necessary conditions for multistationarity in discrete dynamical
280 journal = discreteapplMath,
283 pages = {2403--2413},
290 title = {Les syst\`emes dynamiques discrets},
291 publisher = springer,
293 author = {F. Robert},
295 series = {Math\'ematiques et Applications}
299 author = {Shih, M.-H. and Dong J.-L.},
300 title = {A combinatorial analogue of the Jacobian problem in automata networks},
301 journal = advapplMath,
310 author = {Thomas, R.},
311 title = {Boolean Formalization of Genetic Control Circuits},
319 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
320 title = {Absence of Cycles in Symmetric Neural Networks},
326 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
329 @PROCEEDINGS{DBLP:conf/cav/2002,
330 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
331 Denmark, July 27-31, 2002, Proceedings},
333 editor = {Ed Brinksma and Kim Guldstrand Larsen},
336 publisher = springer,
340 @PROCEEDINGS{DBLP:conf/kbse/2005,
341 title = {20th IEEE/ACM International Conference on Automated Software Engineering
342 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
344 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
346 bibsource = {DBLP, http://dblp.uni-trier.de},
351 author = {Ben-Ari, Mordechai},
353 title = {Principles of the Spin Model Checker},
354 isbn = {1846287693, 9781846287695}},
355 publisher = springer,
359 @INPROCEEDINGS{Wei97,
360 author = {Weise,Carsten},
361 title = {An incremental formal semantics for {PROMELA}},
362 booktitle = {SPIN97, the Third SPIN Workshop},
367 @PHDTHESIS{Couchot-PhD06,
368 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
369 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
372 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
373 TYPE = {Th\`ese de {D}octorat},
378 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
379 Page, M. and Tewfik, S. and Geiselmann, J.},
380 title = {Qualitative simulation of genetic regulatory networks
381 using piecewise-linear models},
382 journal = {Bull. Math. Biol.},
394 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
395 title = {A Fruitful Application of Formal Methods to Biological
396 Regulatory Networks: Extending {T}homas' Asynchronous
397 Logical Approach with Temporal Logic},
398 journal = {J. Theor. Biol.},
408 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
409 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
410 journal = {Biosystems},
422 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
424 title = {Genetic Network Analyzer: qualitative simulation
425 of genetic regulatory networks.},
426 journal = {Bioinformatics},
434 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
435 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
436 journal = {Genes, Genomes and Genomics},
448 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
449 title = {Analysing formal models of genetic regulatory networks with delays},
450 journal = {Int. J. Bioinformatics Res. Appl.},
456 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
457 publisher = {Inderscience Publishers},
458 address = {Inderscience Publishers, Geneva, SWITZERLAND},
461 author = {Richard, A.},
462 title = {Local negative circuits and fixed points in Boolean networks},
463 institution = {preprint arXiv number 0910.0750},
476 author = {Remy, R. and Ruet, P. and Thieffry, D.},
477 title = {Graphic requirement for multistability and attractive cycles in a
478 Boolean dynamical framework},
479 journal = {Advances in Applied Mathematics},
485 timestamp = {2009.02.05}
488 @inproceedings{DBLP:conf/icann/BahiCMMS06,
489 author = {Jacques M. Bahi and
490 Sylvain Contassot-Vivier and
494 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
495 in Heterogeneous Environments},
496 booktitle = {ICANN (2)},
499 ee = {http://dx.doi.org/10.1007/11840930_81},
500 crossref = {DBLP:conf/icann/2006-2},
501 bibsource = {DBLP, http://dblp.uni-trier.de}
504 @proceedings{DBLP:conf/icann/2006-2,
505 editor = {Stefanos D. Kollias and
506 Andreas Stafylopatis and
509 title = {Artificial Neural Networks - ICANN 2006, 16th International
510 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
512 booktitle = {ICANN (2)},
513 publisher = {Springer},
514 series = {Lecture Notes in Computer Science},
517 isbn = {3-540-38871-0},
518 bibsource = {DBLP, http://dblp.uni-trier.de}
525 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
527 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
528 publisher = {Eyrolles},
546 title = {An Introduction to Chaotic Dynamical Systems},
547 publisher = {Redwood City: Addison-Wesley},
549 author = {R. L. Devaney},
552 timestamp = {27/01/2008}
558 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
561 impact-factor ={2.081},
563 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
564 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
565 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
568 pages = {013122-1 -- 013122-9},
569 doi = {10.1063/1.3685524},
570 url = {http://dx.doi.org/10.1063/1.3685524},
571 publisher = {American Institute of Physics},
579 @inproceedings{bgs11:ip,
581 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
584 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
585 title = {Building a Chaotic Proven Neural Network},
586 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
587 address = {Maldives, Maldives},
593 author = {Bahi, Jacques M. and Guyeux, Christophe},
594 title = {Hash Functions Using Chaotic Iterations},
595 journal = {Journal of Algorithms \& Computational Technology},
600 classement = {ACLNI},
601 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
610 @PHDTHESIS{GuyeuxThese10,
611 author = {Christophe Guyeux},
612 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
613 en s\'{e}curit\'{e} informatique},
614 school = {Universit\'{e} de Franche-Comt\'{e}},
616 owner = {christophe},
617 timestamp = {2010.12.21}
620 @INPROCEEDINGS{gfb10:ip,
621 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
622 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
623 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
624 Multimedia Signal Processing},
627 address = {Darmstadt, Germany},
630 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
637 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
638 title = {Topological entropy},
639 journal = {Transactions of the American Mathematical Society},
644 timestamp = {2008.05.29}
648 author = {Rufus Bowen},
649 title = {Entropy for group endomorphisms and homogeneous spaces},
650 journal = {Transactions of the American Mathematical Society},
655 timestamp = {15/02/2008}
658 @article{10.1109/CIMSiM.2010.36,
659 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
660 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
661 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
665 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
666 publisher = {IEEE Computer Society},
667 address = {Los Alamitos, CA, USA},
669 @article{10.1109/ICME.2003.1221665,
670 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
671 title = {Neural network based steganalysis in still images},
672 journal ={Multimedia and Expo, IEEE International Conference on},
676 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
677 publisher = {IEEE Computer Society},
678 address = {Los Alamitos, CA, USA},
681 @ARTICLE{Sullivan06steganalysisfor,
682 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
683 title = {Steganalysis for Markov cover data with applications to images},
684 journal = {IEEE Transactions on Information Forensics and Security},
693 author = "Gray, Frank",
694 title = "Pulse code communication",
695 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
700 @INPROCEEDINGS{guyeux10ter,
701 author = {Bahi, Jacques M. and Guyeux, Christophe},
702 title = {A new chaos-based watermarking algorithm},
703 booktitle = {SECRYPT'10, International Conference on Security
707 address = {Athens, Greece},
709 publisher = {SciTePress},
711 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
717 @inproceedings{Qiao:2009:SM:1704555.1704664,
718 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
719 title = {Steganalysis of MP3Stego},
720 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
723 location = {Atlanta, Georgia, USA},
724 pages = {2723--2728},
726 publisher = {IEEE Press}
731 @article{byrd1995limited,
732 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
733 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
734 journal = {SIAM J. Sci. Comput.},
735 issue_date = {Sept. 1995},
741 pages = {1190--1208},
743 url = {http://dx.doi.org/10.1137/0916069},
744 doi = {10.1137/0916069},
746 publisher = {Society for Industrial and Applied Mathematics},
747 address = {Philadelphia, PA, USA},
748 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
751 @article{ANU:1770520,
752 author = {Powell,M. J. D.},
753 title = {Direct search algorithms for optimization calculations},
754 journal = {Acta Numerica},
761 doi = {10.1017/S0962492900002841},
762 URL = {http://journals.cambridge.org/article_S0962492900002841},
768 journal={The Journal of Supercomputing},
771 doi={10.1007/s11227-010-0500-5},
772 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
773 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
774 publisher={Springer US},
775 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
776 author={Wang, Honggang},
782 author={Yifeng He and Lee, I. and Ling Guan},
783 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
784 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
789 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
790 doi={10.1109/TCSVT.2009.2017411},
794 author={Palomar, D.P. and Mung Chiang},
795 journal={Selected Areas in Communications, IEEE Journal on},
796 title={A tutorial on decomposition methods for network utility maximization},
801 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
802 doi={10.1109/JSAC.2006.879350},
807 journal={EURASIP Journal on Information Security},
811 doi={10.1186/1687-417X-2014-1},
812 title={Universal distortion function for steganography in an arbitrary domain},
813 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
814 publisher={Springer International Publishing},
815 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
819 @inproceedings{conf/wifs/HolubF12,
820 added-at = {2013-01-23T00:00:00.000+0100},
821 author = {Holub, Vojtech and Fridrich, Jessica J.},
822 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
824 crossref = {conf/wifs/2012},
825 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
826 interhash = {cbef658a6868216eef585dd759ae0668},
827 intrahash = {a685b4b8b521ac99734fb52c064ca994},
828 isbn = {978-1-4673-2285-0},
832 timestamp = {2013-01-23T00:00:00.000+0100},
833 title = {Designing steganographic distortion using directional filters.},
834 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
842 author = {Tom{\'a}s Filler and
844 Jessica J. Fridrich},
845 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
847 journal = {IEEE Transactions on Information Forensics and Security},
852 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
853 bibsource = {DBLP, http://dblp.uni-trier.de}
856 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
857 editor = {Ira S. Moskowitz},
858 author = {Shelby Pereira and
859 Sviatoslav Voloshynovskiy and
861 St{\'e}phane Marchand-Maillet and
863 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
864 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
865 title = {Second Generation Benchmarking and Application Oriented
870 publisher = springer,
871 address = springer_loc,
877 @inproceedings{DBLP:conf/ih/Westfeld01,
878 added-at = {2011-06-28T00:00:00.000+0200},
879 author = {Westfeld, Andreas},
880 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
881 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
882 editor = {Ira S. Moskowitz},
884 publisher = springer,
885 address = springer_loc,
888 title = {F5-A Steganographic Algorithm.},
897 @article{Chang20101286,
898 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
899 journal = "Digital Signal Processing",
902 pages = "1286 - 1307",
906 doi = "10.1016/j.dsp.2009.11.005",
907 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
908 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
909 keywords = "Security",
910 keywords = "Wet paper coding",
911 keywords = "Steganography",
912 keywords = "Indicator",
913 keywords = "Fuzzy edge detector"
918 @article{Hu:2007:HPE:1282866.1282944,
919 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
920 title = {A high performance edge detector based on fuzzy inference rules},
921 journal = {Inf. Sci.},
922 issue_date = {November, 2007},
928 pages = {4768--4784},
930 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
931 doi = {10.1016/j.ins.2007.04.001},
933 publisher = {Elsevier Science Inc.},
934 address = {New York, NY, USA},
935 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
939 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
940 author = {Sorina Dumitrescu and
942 editor = {Ahmet M. Eskicioglu and
943 Jessica J. Fridrich and
945 title = {LSB steganalysis based on high-order statistics},
946 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
947 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
950 address = {New York, NY, USA},
953 ee = {http://doi.acm.org/10.1145/1073170.1073176},
954 bibsource = {DBLP, http://dblp.uni-trier.de}
957 @inproceedings{DBLP:conf/ih/Ker05,
958 author = {Andrew D. Ker},
959 title = {A General Framework for Structural Steganalysis of LSB Replacement},
960 editor = {Mauro Barni and
961 Jordi Herrera-Joancomart\'{\i} and
962 Stefan Katzenbeisser and
963 Fernando P{\'e}rez-Gonz{\'a}lez},
964 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
965 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
968 ee = {http://dx.doi.org/10.1007/11558859_22},
969 publisher = springer,
970 address = springer_loc,
978 editor = {Matthias Kirchner and
980 booktitle = {Information Hiding - 14th International Conference, IH 2012,
981 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
982 author = {Jessica J. Fridrich and
984 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
988 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
990 publisher = springer,
991 address = springer_loc,
993 bibsource = {DBLP, http://dblp.uni-trier.de}
997 @article{DBLP:journals/tsp/DumitrescuWW03,
998 added-at = {2012-02-06T00:00:00.000+0100},
999 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
1000 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
1001 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
1002 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
1003 intrahash = {556caad9b61980d3458885153a52321c},
1004 journal = {IEEE Transactions on Signal Processing},
1007 pages = {1995-2007},
1008 timestamp = {2012-02-06T00:00:00.000+0100},
1009 title = {Detection of LSB steganography via sample pair analysis.},
1010 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
1018 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
1019 editor = {Nicolas D. Georganas and
1020 Radu Popescu-Zeletin},
1021 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
1022 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
1024 author = {Jessica J. Fridrich and
1027 title = {Reliable detection of LSB steganography in color and grayscale
1031 ee = {http://doi.acm.org/10.1145/1232454.1232466},
1033 address = {New York, NY, USA},
1035 bibsource = {DBLP, http://dblp.uni-trier.de}
1042 @inproceedings{DBLP:conf/ih/PevnyFB10,
1043 author = {Tom{\'a}s Pevn{\'y} and
1044 Tom{\'a}s Filler and
1046 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
1048 editor = {Rainer B{\"o}hme and
1049 Philip W. L. Fong and
1050 Reihaneh Safavi-Naini},
1051 booktitle = {Information Hiding - 12th International Conference, IH 2010,
1052 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1057 publisher = springer,
1058 address = springer_loc,
1061 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
1062 bibsource = {DBLP, http://dblp.uni-trier.de}
1071 author = {Tom{\'a}s Pevn{\'y} and
1072 Tom{\'a}s Filler and
1075 title = {Break Our Steganographic System},
1076 OPThowpublished = {},
1079 note = {Available at \url{http://www.agents.cz/boss/}},
1083 @proceedings{DBLP:conf/ih/2010,
1084 editor = {Rainer B{\"o}hme and
1085 Philip W. L. Fong and
1086 Reihaneh Safavi-Naini},
1087 title = {Information Hiding - 12th International Conference, IH 2010,
1088 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1090 booktitle = {Information Hiding},
1091 publisher = springer,
1092 address = springer_loc,
1096 isbn = {978-3-642-16434-7},
1097 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
1098 bibsource = {DBLP, http://dblp.uni-trier.de}
1102 @article{DBLP:journals/eswa/ChenCL10,
1103 added-at = {2010-07-21T15:44:10.000+0200},
1104 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
1105 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
1106 date = {2010-05-03},
1107 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
1108 interhash = {bc34a5f04661fee24ee62c39e76361be},
1109 intrahash = {28889a4ab329da28559f0910469f054b},
1110 journal = {Expert Systems with Applications},
1113 pages = {3292-3301},
1114 timestamp = {2010-07-21T15:44:10.000+0200},
1115 title = {High payload steganography mechanism using hybrid edge detector.},
1116 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
1121 @article{DBLP:journals/tifs/FillerJF11,
1122 added-at = {2011-09-29T00:00:00.000+0200},
1123 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
1124 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
1125 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1126 interhash = {b27d23ed0c9936d568e16c51378abccd},
1127 intrahash = {50e43c05a74eec17524b3df8db442da5},
1128 journal = {IEEE Transactions on Information Forensics and Security},
1132 timestamp = {2011-09-29T00:00:00.000+0200},
1133 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
1134 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
1142 @inproceedings{DBLP:conf/ih/KimDR06,
1143 added-at = {2007-09-20T00:00:00.000+0200},
1144 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
1145 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
1146 booktitle = {Information Hiding},
1147 crossref = {DBLP:conf/ih/2006},
1148 date = {2007-09-20},
1149 description = {dblp},
1150 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
1151 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
1152 interhash = {399aab122b39cfd6f6e951a1b276c786},
1153 intrahash = {f0324f70d62d9dfba568e393920aaa16},
1154 isbn = {978-3-540-74123-7},
1158 publisher = springer,
1159 address = springer_loc,
1161 timestamp = {2007-09-20T00:00:00.000+0200},
1162 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
1163 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
1169 @proceedings{DBLP:conf/ih/2006,
1170 editor = {Jan Camenisch and
1171 Christian S. Collberg and
1174 title = {Information Hiding, 8th International Workshop, IH 2006,
1175 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
1176 booktitle = {Information Hiding},
1177 publisher = springer,
1178 address = springer_loc,
1182 isbn = {978-3-540-74123-7},
1183 bibsource = {DBLP, http://dblp.uni-trier.de}
1188 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
1189 author = {Jessica J. Fridrich and
1190 Tom{\'a}s Pevn{\'y} and
1192 title = {Statistically undetectable jpeg steganography: dead ends
1193 challenges, and opportunities},
1195 ee = {http://doi.acm.org/10.1145/1288869.1288872},
1196 editor = {Deepa Kundur and
1197 Balakrishnan Prabhakaran and
1199 Jessica J. Fridrich},
1200 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
1201 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
1203 address = {New York, NY, USA},
1206 isbn = {978-1-59593-857-2},
1207 bibsource = {DBLP, http://dblp.uni-trier.de}
1213 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
1214 editor = {Nasir D. Memon and
1216 Adnan M. Alattar and
1218 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1219 Electronic Imaging Symposium, San Jose, CA, USA, January
1220 18-20, 2010, Proceedings},
1221 author = {Tom{\'a}s Filler and
1223 Jessica J. Fridrich},
1224 title = {Minimizing embedding impact in steganography using trellis-coded
1228 ee = {http://dx.doi.org/10.1117/12.838002},
1229 bibsource = {DBLP, http://dblp.uni-trier.de},
1233 series = {SPIE Proceedings},
1244 @proceedings{DBLP:conf/mediaforensics/2010,
1245 editor = {Nasir D. Memon and
1247 Adnan M. Alattar and
1249 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1250 Electronic Imaging Symposium, San Jose, CA, USA, January
1251 18-20, 2010, Proceedings},
1252 booktitle = {Media Forensics and Security},
1255 series = {SPIE Proceedings},
1258 isbn = {978-0-8194-7934-1},
1259 bibsource = {DBLP, http://dblp.uni-trier.de}
1262 @article{DBLP:journals/corr/abs-1112-5239,
1263 author = {Jacques M. Bahi and
1264 Rapha{\"e}l Couturier and
1265 Christophe Guyeux and
1266 Pierre-Cyrille H{\'e}am},
1267 title = {Efficient and Cryptographically Secure Generation of Chaotic
1268 Pseudorandom Numbers on GPU},
1270 volume = {abs/1112.5239},
1272 ee = {http://arxiv.org/abs/1112.5239},
1273 bibsource = {DBLP, http://dblp.uni-trier.de}
1277 author = {Ponomarenko, Nikolay},
1278 title = {PSNR-HVS-M page},
1279 OPThowpublished = {},
1282 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
1288 author = {Bovik, Alan C.},
1289 title = {BIQI page},
1290 OPThowpublished = {},
1293 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
1298 @InProceedings{PSECAL07,
1299 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
1300 title = {On between-coefficient contrast masking of DCT basis functions},
1301 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
1304 editor = {Li,Baoxin},
1310 OPTorganization = {},
1318 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
1319 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
1320 journal = {IEEE Signal Processing Letters},
1331 @inproceedings{DBLP:conf/crypto/ShubBB82,
1332 author = {Lenore Blum and
1335 title = {Comparison of Two Pseudo-Random Number Generators},
1336 editor = {David Chaum and
1337 Ronald L. Rivest and
1339 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
1340 Barbara, California, USA, August 23-25, 1982},
1342 bibsource = {DBLP, http://dblp.uni-trier.de},
1343 publisher = {Plenum Press},
1344 address={New York, NY, USA},
1347 bibsource = {DBLP, http://dblp.uni-trier.de}
1351 @inproceedings{Blum:1985:EPP:19478.19501,
1352 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
1353 Barbara, California, USA, August 19-22, 1984, Proceedings},
1354 author = {Manuel Blum and
1356 title = {An Efficient Probabilistic Public-Key Encryption Scheme
1357 Which Hides All Partial Information},
1361 editor = {G. R. Blakley and
1363 publisher = springer,
1364 address = springer_loc,
1371 @article{DBLP:journals/ejisec/FontaineG07,
1372 author = {Caroline Fontaine and
1374 title = {A Survey of Homomorphic Encryption for Nonspecialists},
1375 journal = {EURASIP Journal on Information Security},
1380 ee = {http://dx.doi.org/10.1155/2007/13801},
1381 bibsource = {DBLP, http://dblp.uni-trier.de}
1385 @article{Luo:2010:EAI:1824719.1824720,
1386 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
1387 title = {Edge adaptive image steganography based on LSB matching revisited},
1388 journal = {IEEE Transactions on Information Forensics and Security},
1396 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
1397 doi = {10.1109/TIFS.2010.2041812},
1399 publisher = {IEEE Press},
1400 address = {Piscataway, NJ, USA},
1401 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
1404 @article{Mielikainen06,
1405 author = {Mielikainen, J.},
1406 title = {LSB Matching Revisited},
1407 journal = {IEEE Signal Processing Letters},
1422 @article{Liu:2008:FMP:1284917.1285196,
1423 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
1424 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
1425 journal = {Pattern Recogn.},
1426 issue_date = {January, 2008},
1434 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
1435 doi = {10.1016/j.patcog.2007.06.005},
1437 publisher = {Elsevier Science Inc.},
1438 address = {New York, NY, USA},
1439 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
1444 @InProceedings{LHS08,
1445 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
1446 title = {Textural features based universal steganalysis},
1449 booktitle = {Proc. SPIE 6819},
1460 OPTorganization = {},
1467 @InProceedings{KF11,
1468 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
1469 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
1472 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
1476 pages = {78800L-78800L-13},
1485 OPTorganization = {},
1491 @article{DBLP:journals/tifs/KodovskyFH12,
1492 author = {Jan Kodovsk{\'y} and
1493 Jessica J. Fridrich and
1495 title = {Ensemble Classifiers for Steganalysis of Digital Media},
1496 journal = {IEEE Transactions on Information Forensics and Security},
1501 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
1502 bibsource = {DBLP, http://dblp.uni-trier.de}
1507 @article{Fillatre:2012:ASL:2333143.2333587,
1508 author = {Fillatre, Lionel},
1509 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
1510 journal = {IEEE Transactions on Signal Processing},
1518 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
1519 doi = {10.1109/TSP.2011.2174231},
1521 publisher = {IEEE Press},
1522 address = {Piscataway, NJ, USA},
1526 @inproceedings{Tyan1993,
1527 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
1528 address = ieecs_loc,
1530 author = {Tyan, C. Y. and Wang, P. P.},
1531 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
1532 citeulike-article-id = {7936501},
1533 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
1535 posted-at = {2010-10-01 17:27:48},
1538 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
1544 @article{Canny:1986:CAE:11274.11275,
1545 author = {Canny, J},
1546 title = {A Computational Approach to Edge Detection},
1547 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
1548 issue_date = {June 1986},
1556 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
1557 doi = {10.1109/TPAMI.1986.4767851},
1559 publisher = {IEEE Computer Society},
1560 address = {Washington, DC, USA},
1561 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
1565 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
1566 author = {Jessica J. Fridrich and
1567 Jan Kodovsk{\'y} and
1570 title = {Steganalysis of Content-Adaptive Steganography in Spatial
1572 booktitle = {Information Hiding},
1575 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
1576 crossref = {DBLP:conf/ih/2011},
1577 bibsource = {DBLP, http://dblp.uni-trier.de}
1579 @proceedings{DBLP:conf/ih/2011,
1580 editor = {Tom{\'a}s Filler and
1581 Tom{\'a}s Pevn{\'y} and
1584 title = {Information Hiding - 13th International Conference, IH 2011,
1585 Prague, Czech Republic, May 18-20, 2011, Revised Selected
1587 booktitle = {Information Hiding},
1588 publisher = springer,
1589 address = springer_loc,
1593 isbn = {978-3-642-24177-2},
1594 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
1595 bibsource = {DBLP, http://dblp.uni-trier.de}
1598 @inproceedings{DBLP:conf/iwdw/Fridrich11,
1599 author = {Jessica J. Fridrich},
1600 title = {Modern Trends in Steganography and Steganalysis},
1604 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
1605 crossref = {DBLP:conf/iwdw/2011},
1606 bibsource = {DBLP, http://dblp.uni-trier.de}
1608 @proceedings{DBLP:conf/iwdw/2011,
1609 editor = {Yun-Qing Shi and
1610 Hyoung-Joong Kim and
1611 Fernando P{\'e}rez-Gonz{\'a}lez},
1612 title = {Digital Forensics and Watermarking - 10th International
1613 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
1614 2011, Revised Selected Papers},
1616 publisher = springer,
1617 address = springer_loc,
1621 isbn = {978-3-642-32204-4},
1622 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
1623 bibsource = {DBLP, http://dblp.uni-trier.de}
1629 @article{MCErlang07,
1630 author = {Fredlund, Lars-\AAke and Svensson, Hans},
1631 title = {McErlang: a model checker for a distributed functional programming language},
1632 journal = {SIGPLAN Not.},
1641 @inproceedings{Bogor03,
1643 Matthew B. Dwyer and
1645 title = {Bogor: an extensible and highly-modular software model checking
1647 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
1648 of Software Engineering 2003},
1656 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
1657 title = {On Devaney's Definition of Chaos},
1658 journal = {Amer. Math. Monthly},
1664 timestamp = {27/01/2008}
1667 @article{Crook2007267,
1668 title = "Pattern recall in networks of chaotic neurons",
1669 journal = "Biosystems",
1672 pages = "267 - 274",
1675 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
1676 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
1678 keywords = "Spiking neural network"
1682 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
1683 title = {A novel Hash algorithm construction based on chaotic neural network},
1684 journal = {Neural Computing and Applications},
1687 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
1690 keyword = {Computer Science},
1691 publisher = {Springer London}
1695 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
1696 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
1702 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
1703 doi={10.1109/TCE.2004.1309431},
1706 @article{Zhang2005759,
1707 title = "An image encryption approach based on chaotic maps",
1708 journal = "Chaos, Solitons \& Fractals",
1711 pages = "759 - 765",
1715 doi = "10.1016/j.chaos.2004.09.035",
1716 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
1719 @article{Lian20091296,
1720 title = "A block cipher based on chaotic neural networks",
1721 journal = "Neurocomputing",
1724 pages = "1296 - 1301",
1727 author = "Shiguo Lian",
1728 keywords = "Neural network",
1730 keywords = "Security",
1731 keywords = "Block cipher",
1732 keywords = "Image encryption"
1736 author = {George Cybenko},
1737 title = {Approximation by Superpositions of a Sigmoidal function},
1738 journal = {Mathematics of Control, Signals and Systems},
1745 @article{DBLP:journals/nn/HornikSW89,
1746 author = {Kurt Hornik and
1747 Maxwell B. Stinchcombe and
1749 title = {Multilayer feedforward networks are universal approximators},
1750 journal = {Neural Networks},
1755 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
1756 bibsource = {DBLP, http://dblp.uni-trier.de}
1759 @article{dalkiran10,
1760 author = {Ilker Dalkiran and Kenan Danisman},
1761 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
1762 title = {Artificial neural network based chaotic generator for cryptology},
1770 @article{springerlink:10.1007/s00521-010-0432-2,
1771 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
1772 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
1773 title = {A novel Hash algorithm construction based on chaotic neural network},
1774 journal = {Neural Computing and Applications},
1775 publisher = {Springer},
1777 keyword = {Computer Science},
1783 @article{Feder2009NTB,
1784 author = {Feder, Tom\'{a}s and Subi, Carlos},
1785 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
1786 journal = {Inf. Process. Lett.},
1787 issue_date = {February, 2009},
1795 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
1796 doi = {10.1016/j.ipl.2008.10.015},
1798 publisher = {Elsevier North-Holland, Inc.},
1799 address = {Amsterdam, The Netherlands, The Netherlands},
1800 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
1806 author={Zanten, A.~J.~van and Suparta, I.~N.},
1807 title={ Totally balanced and exponentially balanced Gray codes},
1808 journal={Discrete Analysis and Operational Research},
1819 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1822 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
1823 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
1824 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},